Research Article

Key determinants and strategies for cybersecurity education in Yemen

Ismail Abdullah Hasan Humied 1 *
More Detail
1 Faculty of Police, Policy Academic, Ministry of Interior, Sana’a, YEMEN* Corresponding Author
Journal of Digital Educational Technology, 3(2), 2023, ep2304, https://doi.org/10.30935/jdet/13178
Published Online: 11 April 2023, Published: 01 May 2023
OPEN ACCESS   1120 Views   1095 Downloads
Download Full Text (PDF)

ABSTRACT

The availability of an education system capable of developing skills, and thus a trained workforce with cyber-competence, is a prerequisite for avoiding cyber-attacks on a country’s critical infrastructure. Hiring foreign workers or outsourcing some operations is possible, but this is not a long-term solution and poses other problems. The available literature provides recommendations for creating a nationwide development, but little is known about the variables affecting the growth of cybersecurity education in developing countries like Yemen. Using data from 19 semi-structured meetings with academic officials from seven universities and academic entities, and then qualitative analysis these data, this article discusses the determinants of cybersecurity education, and approaches to improve cybersecurity education. To enhance current preparation, there is an urgent need for a national cybersecurity education strategy, which supports a number of initiatives and creates a multi-stakeholder space, where government, labor market, and academia can actively work together to meet national cybersecurity education requirements. Also, there is needed to complete the preparations to promote research and development skills and cybersecurity awareness while enhancing educator training and academic cybersecurity programse.

CITATION (APA)

Humied, I. A. H. (2023). Key determinants and strategies for cybersecurity education in Yemen. Journal of Digital Educational Technology, 3(2), ep2304. https://doi.org/10.30935/jdet/13178

REFERENCES

  1. AACS. (2022). Academic accreditation council strategy. https://www.caqa-yemen.org/
  2. Akkar, H., & Alamery, A. (2022). Requirements for the development of scientific research in Yemeni universities from expert persons. Journal of Educational and Psychological Sciences, 6(21), 1-22.
  3. Al Khateeb, K., Al Awadhi, A., & Al-Hakiem, S. (2021). Half a century of Sana’a University scientific publication collection: A descriptive analytic study (1970-2020). Yemeni Journal of Scientific Research, 5, 1.
  4. Aury, M. C., & Alfredo, C. (2013, August). Faculty attitudes toward teaching ethical hacking to computer and information systems undergraduates students [Paper presentation]. Eleventh LACCEI Latin American and Caribbean Conference for Engineering and Technology (LACCEI’2013): Innovation in Engineering, Technology and Education for Competitiveness and Prosperity, August 14 - 16, 2013 Cancun, Mexico. https://bit.ly/40gqjoq
  5. Bishop, M., & Taylor, C. (2009). A critical analysis of the centers of academic excellence program. https://escholarship.org/uc/item/33k0z5tm
  6. CAQAY. (2023). National academic reference standards (NARS) for computing programs. Council for Accreditation and Quality Assurance. http://www.hti.edu.eg/images/webPages/file/NARS%20computer%20science.pdf
  7. Catota, F., Morgan, M., & Sicker, D. C. (2019). Cybersecurity education in a developing nation: The Ecuadorian environment. Journal of Cybersecurity, 5, 1-19. https://doi.org/10.1093/cybsec/tyz001
  8. Cranor, L. F. (2008). A framework for reasoning about the human in the loop. In Proceedings of the 1st Conference on Usability, Psychology, and Security (pp. 1-15). USENIX Association.
  9. Creswell, J., & Creswell, J. (2017). Research design: Qualitative, quantitative, and mixed methods approaches. SAGE.
  10. Curbelo, A. M., & Cruz, A. (2013). Faculty attitudes toward teaching ethical hacking to computer and information systems undergraduates students. In Proceedings of the 11th LACCEI Latin American and Caribbean Conference for Engineering and Technology (pp. 1-8).
  11. Dark, M. (2014). Advancing cybersecurity education. IEEE Security & Privacy Magazine, 12(6), 79-83. https://doi.org/10.1109/MSP.2014.108
  12. Department for Digital, Culture, Media & Sport. (2017). Cyber security CNI apprenticeships. https://www.gov.uk/guidance/cyber-security-cni-apprenticeships
  13. Furman, S., Theofanos, M. F., Choong, Y.-Y., & Stanton, B. (2012). Basing cybersecurity training on user perceptions. IEEE Security & Privacy, 10(2), 40-49. https://doi.org/10.1109/MSP.2011.180
  14. Harašta, J. (2013). Cyber security in young democracies. Jurisprudencija [Jurisprudence], 20(4), 1457-1472. https://doi.org/10.13165/JUR-13-20-4-10
  15. Hathaway, M., Demchak, C., Kerben, J., McArdle, J., & Spidalieri, F. (2015). Cyber readiness index 2.0. Potomac Institute for Policy Studies. https://www.potomacinstitute.org/images/CRIndex2.0.pdf
  16. Higher Authority for Science, Technology, & Innovation. (2021). https://www.oecd.org/sti/641/
  17. Humied, I. A. (2022a). Common risks and challenges in cybercrime. http://matjournals.co.in/index.php/JCSPIC/article/view/1174
  18. Humied, I. A. (2022b). Cybersecurity as an emerging challenge to Yemen security. http://matjournals.co.in/index.php/JCSCS/article/view/1139
  19. Humied, I. A. (2023). Cybersecurity (Kindle Edn.). Amazon. https://a.co/d/44cfZbK
  20. Inter-American Development Bank. (2016). Cybersecurity: Are we ready in Latin America and the Caribbean? https://publications.iadb.org/en/cybersecurity-are-we-ready-latin-america-and-caribbean
  21. ITU. (2007). Cybersecurity work program to assist developing countries. International Telecommunication Union. https://www.itu.int/ITU-D/cyb/cybersecurity/docs/itu-cybersecurity-work-programme-developing-countries.pdf
  22. ITU. (2014). Global cybersecurity index. https://www.itu.int/en/ITU-D/Cybersecurity/Documents/WP-GCI-101.pdf
  23. Kabay, M. (1994). Psychological factors in the implementation of information security policy. Control and Security Newsletter, 11(10), 1-10. https://doi.org/10.1080/07366989409451659
  24. Klimburg, A. (2012). NATO national cyber security framework manual. NATO CCD COE Publications.
  25. Kortjan, N., & Von Solms, R. (2012). Cyber security education in developing countries: A South African perspective. In K. Jonas, K., I. A. Rai, & M. Tchuente (Eds.), e-Infrastructure and e-services for developing countries (pp. 289-297). Springer. https://doi.org/10.1007/978-3-642-41178-6_30
  26. Kortjan, N., & Von Solms, R. (2014). A conceptual framework for cyber-security awareness and education in SA. South African Computer Journal, 54, 29-41. https://doi.org/10.18489/sacj.v52i0.201
  27. Lehto, M. (2015). Cyber security competencies: Cyber security education and research in Finnish universities. In Proceedings of the 14th European Conference on Cyber Warfare & Security (pp. 179-188).
  28. Lokman, H. F. B., Nasri, N. M., & Khalid, F. (2019). The effectiveness of using Twitter application in teaching pedagogy: A meta-synthesis study. International Journal of Academic Research in Progressive Education and Development, 8(2), 205-212. https://doi.org/10.6007/IJARPED/v8-i2/5696
  29. Miles, D. (2011). Youth protection: Digital citizenship- principles and new recourses. IEEE Xplore. http://ieeexplore.ieee.org/document/5978778/
  30. Ministry of Higher Education and Scientific Research. (2021). The generalization. Yemen Network for Education News. https://www.ymnedunews.net/
  31. Muller, L. P. (2015). Cyber security capacity development in developing countries: Challenges and opportunities. Norwegian Institute of International Affairs. https://cybilportal.org/wp-content/uploads/2020/06/NUPIReport03-15-Muller.pdf
  32. National Audit Office. (2013). The UK cyber security strategy: Landscape review. National Audit Office.
  33. National Cyber Security Strategy. (2011). Protecting and promoting the UK in a digital world. https://www.gov.uk/government/news/protecting-and-promoting-the-uk-in-a-digital-world--3
  34. National Cyber Security Strategy. (2023). https://tinyurl.com/sdc85sfa
  35. NCC. (2021). The first national conference on cybersecurity. (2021, June 7-9). Ministry of Communications and Information Technology, Sana’a, Yemen. https://www.sabafon.com.ye/en/sponsored-by-the-ministry-of-communications-the-conclusion-of-cyber-security-first-national-conference-in-sanaa/
  36. Newmeyer, K. P. (2015). Elements of national cybersecurity strategy for developing countries. National Cybersecurity Institute Journal, 2015, 9-19.
  37. NICE. (2010). Relationship to President’s education agenda. National Initiative for Cybersecurity Education. https://www.whitehouse.gov/priorities/
  38. Parekh, A., Pawar, A. M., Munot, P., & Mantri, P. (2011). Secure authentication using anti-screenshot virtual keyboard. International Journal of Computer Science Issues, 8(5), 534-537.
  39. Paulsen, C., McDuffie, E., Newhouse, W., & Toth, P. (2012). NICE: Creating a cybersecurity workforce and aware public. IEEE Security & Privacy, 10(3), 76-79. https://doi.org/10.1109/MSP.2012.73
  40. Petersen, R., Santos D., Smith M., Wetzel K., & Witte G. (2020). Workforce framework for cybersecurity (NICE framework). https://doi.org/10.6028/NIST.SP.800-181r1
  41. Pitchan M., Omar S., Bolong J., & Ghazali A. (2017). Analisis keselamatan siber dari perspektif persekitaran social: Kajian terhadap pengguna internet di Lembah Klang [Analysis of cyber security from the perspective of the social environment: A study of internet users in the Klang Valley]. Journal of Social Science and Humanities, 12, 16-29.
  42. Police College-Ministry of Interior. (2020). A cybersecurity awareness workshop. Althawrah. https://althawrah.ye/archives/641310
  43. Raytheon. (2015). Securing our future: Closing the cybersecurity talent gap (October 2015). Raytheon Company. https://library.cyentia.com/report/report_002051.html
  44. Salamzada, K., Shukur, Z., & Abu Bakar, M. (2015). A framework for cybersecurity strategy for developing countries: Case study of Afghanistan. Asia-Pacific Journal of Information Technology and Multimedia, 4(1), 1-10. https://doi.org/10.17576/apjitm-2015-0401-01
  45. Schneider, F. B. (2013). Cybersecurity education in universities. IEEE Security & Privacy; 11, 3-4. https://doi.org/10.1109/MSP.2013.84
  46. Schweitzer, D., Humphries, J. W., & Baird, L. C. (2006). Meeting the criteria for a Center of Academic Excellence (CAE) in information assurance education. Journal of Computing Sciences in Colleges, 22(1), 151-160.
  47. Sledge, C. A. (2005). Building information assurance educational capacity: Pilot efforts to date. Carnegie Mellon University, Software Engineering Institute. https://doi.org/10.21236/ADA452451
  48. Target, A. C. (2010). Cybersecurity challenges in developing nations [Doctoral dissertation, Carnegie Mellon University].
  49. TEMPUS. (2013). Report on EU practice for cyber security education. https://ecesm.net/sites/default/files/Dev%201.2.-v1.4-FINAL.pdf
  50. Tidewater Community College. (2017). TCC to offer first cybersecurity apprentice education in Virginia. https://news.tcc.edu/cybersecurity-apprenticeship/
  51. Von Solms, R., & Von Solms, S. (2015). Cyber safety education in developing countries. Systemics, Cybernetics and Informatics, 13(2), 14-19.
  52. Wright, M. (2015). Improving cybersecurity workforce capacity and capability. ISSA Journal, 14-20.